Juniata Classifieds>Juniata Online Courses>History of Games:Prehistory to the late 1980s

History of Games:Prehistory to the late 1980s

About this Course

Want to take a fascinating journey through the history of gaming? Then this course is for you. Our journey begins with an exploration of how ancient board games evolved into modern board games and arcade games. Then we will explore the development of first- and second-generation video games, and finally, innovative third-generation game technology. In this course, you will learn about the history of game design, features and applications of the earliest video games and the second-generation video game consoles developed in the 1970s and 1980s. You will also discover how the American video game industry crash of 1983 paved the way for game developers and game companies around the world—particularly Nintendo and Sega from Japan—to dominate the video game market of the late 1980s and develop the third generation of consoles. Topics covered include: Pre-electronic games Birth of an industry Explosion and crash Rebirth of an industry

Created by: LaSalle College

Level: Introductory


Related Online Courses

Please Note: Learners who successfully complete this IBM course can earn a skill badge — a detailed, verifiable and digital credential that profiles the knowledge and skills you’ve acquired in thi... more
To prepare you for this course, we recommend completing the free 3-hour introductory MOOC Re-Imagine Work - Strategies During COVID-19 and Beyond. In this course, you will gain a foundational... more
Welcome to the self paced course, Algorithms: Design and Analysis, Part 2! Algorithms are the heart of computer science, and the subject has countless practical applications as well as intellectual... more
The Relational Database Management Systems course provides you with a basic understanding of relational databases. You will create databases and gain real-world experience with several popular... more
Information security refers to securing data and information systems from unauthorized access, unauthorized use, misuse, destruction, or alteration. The goal of information security is to protect... more

CONTINUE SEARCH

FOLLOW COLLEGE PARENT CENTRAL